Sciweavers

2891 search results - page 80 / 579
» More or Less Elaborate
Sort
View
AAAI
2012
13 years 1 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe
AIED
2009
Springer
15 years 5 months ago
To Tutor or Not to Tutor: That is the Question
Intelligent tutoring systems often rely on interactive tutored problem solving to help students learn math, which requires students to work through problems step-by-step while the ...
Leena M. Razzaq, Neil T. Heffernan
IEEEARES
2009
IEEE
15 years 5 months ago
Linking Privacy Solutions to Developer Goals
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security community because of the existing synergy between se...
Kim Wuyts, Riccardo Scandariato, Bart De Decker, W...
IJCNLP
2005
Springer
15 years 4 months ago
A Comparative Study of Language Models for Book and Author Recognition
Abstract. Linguistic information can help improve evaluation of similarity between documents; however, the kind of linguistic information to be used depends on the task. In this pa...
Özlem Uzuner, Boris Katz
ECRTS
2003
IEEE
15 years 4 months ago
Establishing Timing Requirements and Control Attributes for Control Loops in Real-Time Systems
Advances in scheduling theory have given designers of control systems greater flexibility over their choice of timing requirements. This could lead to systems becoming more respon...
Iain Bate, Peter Nightingale, Anton Cervin